Don't have an account?

Russian Underground 101

This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.

Meizhou Municipal Information Centre provides information services to the municipality of Meizhou, China, which has a population of 5.5 million people. The Information Centre is part of the Bureau of Economy and Information, and serves 1,000 municipal and county government bodies.
The Meizhou Municipal Information Centre’s small staff provides and maintains information services to the city through the government portal site, extranet and data center. The IT staff wanted to avoid downtime and improve backup and recovery. Download whitepaper »

Organizations across the globe are finding disaster recovery increasingly important
for a number of reasons. This white paper explains how virtualization technology can solve the cost vs. time
dilemma traditional data recovery solutions pose, enabling organizations to quickly
and cost effectively recover all server workloads. Download whitepaper »

Managing your data center means more than just keeping your server workloads running; it also means protecting these workloads. After all, servers are costly: You incur physical costs, such as capital, power and cooling costs, as well as software licensing and support costs. If your servers are worth all this expense, they’re worth protecting from unexpected downtime. Download whitepaper »

Top Whitepapers

More and more government agencies are turning to a BYOD strategy. While this can make more transactions mobile and potentially decrease IT costs, they may also make the agency vulnerable to security breaches.
•One of the biggest threats is social engineering, a process by which an adversary tricks the user into offering up information or access rights.
•While there are several types of social engineering to be on the lookout for, there are three dominant attacks to watch
•As agencies debate expanded device and data management policies, creating a divide between personal and professional content is essential

Featured Whitepapers

The recent discontinuation of Microsoft Forefront Threat Management Gateway (TMG) requires enterprises to find a new solution to secure corporate access to the web.
•See the alternative paths to security after the discontinuation of the popular Microsoft Forefront TMG
•Understand the important standards needed for new solutions to safeguard web access
•Learn the four functions needed to ensure secure and managed access to Internet resources

Copyright 2015 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.